Mozilla Firefox 3.6.x < 3.6.11 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 5682

Synopsis

The remote host has a web browser installed that is vulnerable to multiple attack vectors.

Description

Versions of Firefox 3.6.x earlier than 3.6.11 are potentially affected by multiple vulnerabilities :

- Multiple memory safety bugs could lead to memory corruption, potentially resulting in arbitrary code execution. (MFSA 2010-64)
- By passing an excessively long string to 'document.write' it may be possible to trigger a buffer overflow condition resulting in arbitrary code execution on the remote system. (MFSA 2010-65)
- A use-after-free error in nsBarProp could allow arbitrary code execution on the remote system. (MFSA 2010-66)
- A dangling pointer vulnerability in LookupGetterOrSetter could allow arbitrary code execution. (MFSA 2010-67)
- The Gopher parser is affected by a cross-site scripting vulnerability. (MFSA 2010-68)
- It is possible to steal information from a site in a different domain using modal calls. (MFSA 2010-69)
- It is possible to establish a valid SSL connection to a remote host, provided the SSL certificate was created with a common name containing a wild card followed by the partial IP address of the remote host. (MFSA 2010-70)
- A function used to load external libraries on the Windows platform could allow loading of unsafe DLL's thus allowing binary planting attack. (MFSA 2010-71)
- The SSL implementation allows servers to use Diffie-Hellman mode (DHE) with a very short key length. Such key lengths could be easily breakable with modern hardware. (MFSA 2010-72)

Solution

Upgrade to Firefox 3.6.11 or later.

See Also

http://www.westpoint.ltd.uk/advisories/wp-10-0001.txt

http://www.zerodayinitiative.com/advisories/ZDI-10-219

http://www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.11

http://www.mozilla.org/security/announce/2010/mfsa2010-64.html

http://www.mozilla.org/security/announce/2010/mfsa2010-65.html

http://www.mozilla.org/security/announce/2010/mfsa2010-66.html

http://www.mozilla.org/security/announce/2010/mfsa2010-67.html

http://www.mozilla.org/security/announce/2010/mfsa2010-68.html

http://www.mozilla.org/security/announce/2010/mfsa2010-69.html

http://www.mozilla.org/security/announce/2010/mfsa2010-70.html

http://www.mozilla.org/security/announce/2010/mfsa2010-71.html

http://www.mozilla.org/security/announce/2010/mfsa2010-72.html

Plugin Details

Severity: Medium

ID: 5682

File Name: 5682.prm

Family: Web Clients

Published: 2010/10/20

Modified: 2017/02/02

Dependencies: 9131

Nessus ID: 50085

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 2010/10/19

Vulnerability Publication Date: 2010/08/11

Reference Information

CVE: CVE-2010-3170, CVE-2010-3173, CVE-2010-3174, CVE-2010-3175, CVE-2010-3176, CVE-2010-3177, CVE-2010-3178, CVE-2010-3179, CVE-2010-3180, CVE-2010-3181, CVE-2010-3182, CVE-2010-3183

BID: 44243, 44245, 44246, 44247, 44248, 44249, 44250, 44251, 44252, 44253

IAVA: 2011-A-0160